Research Article

Rogue Device Mitigation in the Internet of Things: A Blockchain-Based Access Control Approach

Algorithm 2

Initializing the subject–object pair nodes.
whiledo
fordo
  
  
  fordo
   
fordo
  
  
whiledo
  
  
  ifthen